Skip to main content
Log in

Blockchain-based data integrity framework for Internet of Things

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is one important digital revolution in both the academic world and commerce. It brings convenience to people’s daily lives; but, the challenges of security and privacy have become a very big task in IoT. Attaining safety and data integrity verification of information in IoT networks is one of the hot topics for future IoT applications. The provision of security to any information in an IoT network is a big challenge, which must be given the top priority for many current and future applications of IoT. Traditional data integrity verification approaches only use encryption algorithms to secure information, depending on third-party auditors (TPAs). The blockchain’s basic principle is that information produced by users or nodes is tested for accuracy and cannot be altered once it is updated on the blockchain. Blockchain-based data integrity schemes can effectively overcome TPA’s issues. In this paper, we propose a blockchain-based data integrity technique with a bilinear design for IoT information. We achieve data integrity according to the characteristics of bilinear design in the form of blockchain communications. The proposed blockchain-based framework for data integrity verification consists of different entities such as client, Key Generation Centre (KGC), cloud storage server, and blockchain. Proposed data integrity verification operates in three stages: Setup stage, Processing stage and Verification stage. Simulation results show that the performance of the proposed blockchain approach for data integrity in IoT is better as compared with the blockchain-based cloud data integrity verification scheme with high efficiency (DICF). The results demonstrate that our scheme is better in terms of signature generation time, end-to-end delay, memory utilization as compared to DICF.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Research data policy and data availability statements

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Chanal, Poornima M., Kakkasageri, Mahabaleshwar S.: Security and Privacy in IoT: A Survey. Journal of Wireless Personal Communication 115(3), 1667–1693 (2020)

    Article  Google Scholar 

  2. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Journal of Future Generation Computer Systems 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  3. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: Vision, Applications and Research Challenges. Journal of Ad Hoc Networks 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  4. Yang, D., Liu, F., Liang, Y.: A Survey of Internet of Things, Proc. of the International Conference on E-Business Intelligence (ICEBI’10), Vol. 978, pp. 78–99, China, (2010)

  5. “Vision and Challenges for Realizing the Internet of Things”, Cluster of European Research Projects on the Internet of Things, European Commission Information Society and Media, (2010)

  6. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the Internet of Things: A Review, Proc. of the IEEE International Conference on Computer Science and Electronics Engineering, Vol. 3. pp. 648–651, China, (2012)

  7. Poornima, M., Chanal, Mahabaleshwar S., Kakkasageri, Sunilkumar S., Manvi: “Security and Privacy in Internet of Things: Computational Intelligent Techniques based Approaches”, Recent Trends in Computational Intelligence Enabled Research, pp. 111–127, (2021)

  8. Yang, G., Xu, J., Chen, W., Qi, Z. H., Wang, H.Y.: Security Characteristics and Technology in the Internet of Things, Journal of Nanjing University of Posts and Telecommunications, 30(4), (2010)

  9. Wang, Haiyan, Zhang, Jiawei: Blockchain Based Data Integrity Verification for Large Scale IoT Data. Journal of IEEE Access 7, 164996–165006 (2019)

    Article  Google Scholar 

  10. Wang, Xu, Zha, Xuan, Ni, Wei, Liu, Ren Ping, Guo, Y. Jay, Niu, Xinxin, Zheng, Kangfeng: Survey on Blockchain for Internet of Things, Journal of Computer Communications, Elsevier, 136, pp. 10–29, (2019)

  11. Md. Ashraf Uddin, Andrew Stranieri, Iqbal Gondal, Venki Balasubramanian, “A Survey on the Adoption of Blockchain in IoT: Challenges and Solutions”, Journal of Blockchain: Research and Applications, 2(2), pp. 1–49, 2021

  12. Mao, Jian, Zhang, Yan, Li, Pei, Li, Teng, Qianhong, Wu., Liu, Jianwei: A Position Aware Merkle Tree for Dynamic Cloud Data Integrity Verification. Journal of Soft Computing 21, 2151–2164 (2017)

    Article  Google Scholar 

  13. Furukawa, J., Imai, H.: An Efficient Group Signature Scheme from Bilinear Maps, Proc. of the International Conference on Information Security and Privacy, Berlin, (2005)

  14. Huang, Junqin, Kong, Linghe, Chen, Guihai, Min-You, Wu., Liu, Xue, Zeng, Peng: Towards Secure industrial IoT: Blockchain System with Credit based Consensus Mechanism. IEEE Transactions on Industrial Informatics 15(6), 3680–3689 (2019)

    Article  Google Scholar 

  15. Yong, Yu., Li, Yannan, Tian, Junfeng, Liu, Jianwei: Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. Jouranal of IEEE Wireless Communications 21(3), 12–18 (2018)

    Google Scholar 

  16. Ul Hassan, M., Rehmani, M.H., Chen, J.: Privacy Preservation in Blockchain based IoT Systems: Integration Issues, Prospects, Challenges, and Future Research Directions, Journal of Future Generation Computer Systems, Vol. 97, pp. 512–529, (2019)

  17. Zorzo, Javelino F., Nunes, Henry C., Lunardi, Roben C., Michelin, Regio A., Kanhere, Salil S.: Dependable IoT using Blockchain based Technology, In 2018 Eighth Latin-American Symposium on Dependable Computing (LADC), pp, 1–9, Brazil, (2018)

  18. Si, Haiping, Sun, Changxia, Li, Yanling, Qiao, Hongbo, Shi, Lei: IoT Information Sharing Security Mechanism based on Blockchain Technology. Journal of Future Generation Computer Systems 101, 1028–1040 (2019)

    Article  Google Scholar 

  19. Chen, Yu-Jia., Wang, Li-Chun., Wang, Shu: Stochastic Blockchain for IoT Data Integrity. Journal of IEEE Transactions on Network Science and Engineering 7(1), 373–384 (2020)

    Article  Google Scholar 

  20. Yue, D., Li, R., Zhang, Y., Tian, W., Huang, Y.: Blockchain based Verification Framework for Data Integrity in Edge Cloud Storage. Journal of Parallel and Distributed Computing 146, 1–14 (2020)

    Article  Google Scholar 

  21. Peng, Ceng Wei, Wang, Dahu, Zhao, Yu, Tyagi, Sumarga Kumar Sah, Kumar, Neeraj: Blockchain Data-based Cloud Data Integrity Protection Mechanism. Journal of Future Generation Computer Systems 102, 902–911 (2020)

  22. Zhang, Yuan, Chunxiang, Xu., Lin, Xiaodong, Xuemin: Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. IEEE Transactions on Cloud Computing 9(3), 923–937 (2021)

  23. Xie, Lixia, Ding, Ying, Yang, Hongyu, Wang, Xinmu: Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs. Journal of IEEE Access 7, 56656–56666 (2019)

    Article  Google Scholar 

  24. Ma, Mingxin, Shi, Guozhen, Li, Fenghua: Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario. Journal of IEEE Access 7, 34046–34059 (2019)

    Google Scholar 

  25. Atlam, H.F., Walters, R.J., Wills, G.B., Alenezi, A., Alharthi, A.: Integration of Cloud Computing with Internet of Things: Challenges and Open Issues, Proc. of The IEEE International Conference on Internet of Things and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 670–675, UK, (2017)

  26. Hang, Lei, Kim, Do Hyuen: Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity, Journal of Sensor, 19(10), (2019)

  27. Kleinaki, Athina Styliani, Mytis-Gkometh, Petros, Drosatos, George: A Blockchain-Based Notarization Service for Biomedical Knowledge Retrieval. Journal of Computational and Structural Biotechnology 16, 288–297 (2018)

  28. Hang, Lei, Ullah, Israr, Kim, DoHyeun: A Secure Fish Farm Platform based on Blockchain for Agriculture Data Integrity. Journal of Computers and Electronics in Agriculture 170, 1–15 (2020)

    Article  Google Scholar 

  29. Machado, Caciano, Frohlich, Antonio Augusto: IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain, Proc. of the International Symposium on Object Oriented Real Time Distributed Computing, pp. 83-90, Singapore, (2018)

  30. Koo, Dongyoung, Shin, Youngjoo, Yun, Joobeom, Hur, Junbeom: Improving Security and Reliability in Merkle Tree-Based Online Data Authentication with Leakage Resilience. Journal of Applied Science 8, 1–29 (2018)

    Google Scholar 

  31. Arunachalam, A.R., Michael, G.: Merkle Hash Tree with Hash based Digital Signature for Cloud data Confidentiality and Security. Journal of Pure and Applied Mathematics 119(12), 12233–12242 (2018)

    Google Scholar 

  32. Mamun, Quazi, Islam, Rafiqul, Kaosar, Mohammed: Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. Journal of Security Communication 127, 367–379 (2013)

    Google Scholar 

  33. Altulyan, May, Yao, Lina, Kanhere, Salil S., Wang, Xianzhi, Huang, Chaoran: A Unified Framework for Data Integrity Protection in People-centric Smart Cities, Journal of Multimedia Tools and Applications. 79, pp. 4989–5002, (2020)

  34. Chanal, Poornima M., Kakkasageri, Mahabaleshwar S.: Preserving Data Confidentiality in Internet of Things. Journal of SN Computer Science, Springer 2(01), 1–12 (2021)

    Google Scholar 

  35. Othman, Soufiene Ben, Bahattab, Abdullah Ali, Trad, Abdelbasset, Youssef, Habib: Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption. Journal of Wireless Personal Communication 80, 867–889 (2015)

  36. Awasthi, Prakhar, Mittal, Sanya, Mukherjee, Sibeli, Limbasiya, Trupil: A Protected Cloud Computation Algorithm Using Homomorphic Encryption for Preserving Data Integrity, Proc. of the \(5^{th}\) International Conference on Advanced Computing, Networking and Informatics, pp. 509–517, Goa, (2018)

  37. Chandravathi, D., Lakshmi, P.V.: A New Hybrid Homomorphic Encryption Scheme for Cloud Data Security. Journal of Advances in Computational Sciences and Technology 10(5), 825–837 (2017)

    Google Scholar 

  38. Liu, Yun, Li, Chaoran, Zhang, Jing, Liu, Qing: A Homomorphic MAC-based Secure Data Aggregation Scheme for Wireless Sensor Networks. Journal of Internet Technology 19(7), 2069–2077 (2018)

    Google Scholar 

  39. Xie, Gaopeng, Liu, Yuling, Xin, Guojiang, Yang, Qiuwei: Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency. Journal of Security and Communication Networks 2021, 01–15 (2021)

    Google Scholar 

  40. Mamta, Brij B., Gupta, Kuan-Ching Li, Leung, Victor C.M., Psannis, Kostas E., Yamaguchi, Shingo: Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System, Journal of Automatica Sinica, 8,(12), 1877–1890, (2021)

  41. Tewari, Aakanksha, Gupta, Brij B.: Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags. Journal of Semantic Web and Information Systems 16(3), 20–34 (2020)

    Article  Google Scholar 

  42. Cvitic, Ivan, Perakovic, Dragan, Perisa, Marko, Gupta, Brij: Ensemble Machine Learning Approach for Classification of IoT Devices in Smart Home. Journal of Machine Learning and Cybernetics 12, 3179–3202 (2021)

    Article  Google Scholar 

  43. Al-Qerem, Ahmad, Alauthman, Mohammad, Almomani, Ammar, Gupta, B.B.: IoT Transaction Processing through Cooperative Concurrency Control on Fog-Cloud Computing Environment, Journal of Soft Computing, 24, pp. 5695–5711, (2020)

  44. Vipindev, Adat B.B., Gupta: Security in Internet of Things: Issues, Challenges, Taxonomy, and Architecture. Journal of Telecommunication Systems 24, 423–441 (2018)

  45. Zhang, Junwei, Wang, Zhuzhu, Wang, Dandan, Zhang, Xinglong, Gupta, Brij B., Liu, Ximeng, Ma, Jianfeng: A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box. IEEE Transactions on Industrial Informatics 18(9), 6160–6170 (2022)

    Article  Google Scholar 

  46. Bulla, Chetan M., Birje, Mahantesh N.: A Multi-Agent-Based Data Collection and Aggregation Model for Fog Enabled Cloud Monitoring. Journal of Cloud Applications and Computing 11(1), 73–92 (2021)

    Google Scholar 

  47. Stergioua, Christos, Psannisa, Kostas E., Guptab, Brij B., Ishibashic, Yutaka: Security, Privacy and Efficiency of Sustainable Cloud Computing for Big Data and IoT. Journal of Sustainable Computing: Informatics and Systems 19, 174–184 (2018)

    Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

Both authors equally contributed.

Corresponding author

Correspondence to Poornima M. Chanal.

Ethics declarations

Conflict of interest

Author Mrs. Poornima M. Chanal declares that she has no conflict of interest. Author Dr. Mahabaleshwar S. Kakkasageri declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chanal, P.M., Kakkasageri, M.S. Blockchain-based data integrity framework for Internet of Things. Int. J. Inf. Secur. 23, 519–532 (2024). https://doi.org/10.1007/s10207-023-00719-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00719-6

Keywords

Navigation